摘要:
Intrusion detection is an efficient way to protect information system. This paper puts forward a new method of anomalous intrusion detection based on system call. It uses system calls regarded as input, and creates a FSA (finite-state automation machine) for the functions in the program. Then the FSA is used to detect the attack. Moreover, it can find the place of the vulnerability which exists in the program. This can help to alter the source program. Results are shown that this method is effective for some intrusion events.
会议名称:
Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings
摘要:
Along with high development of multimedia information technique, the provider of badness information embeds some badness information to image or directly saves as a image file, avoiding the filter of image, which brings extreme effect of security hidden trouble in society. An information audit system based on image content filtering is provided in this paper. At first, we discuss some basic method filtering physical badness image content, analyze some key technology of filtering image content, and mark as texture character by four eigenvectors: contrast, energy, entropy and correlation. Afterwards, we utilize dynamic programming method to segment image objects, and utilize similarity measurement to denote similarity degree of two character measures. At last, we give an example of identify yellow content, which distill the texture character of image and match it with defined character database. Our system can supervise and control badness information of physical badness image content, and realize automation audit of multimedia information.
摘要:
The problem in network security presently is how to get real-time intrusion detection and alert. In the paper, we design Intrusion Detection System architecture and arithmetic again, meanwhile put forward an improved pattern matching arithmetic based on protocol analysis and theorization machine on Frete. New architecture can use network processor to collect and analyze data in network bottom, which enhance the speed and efficiency in Detection System.